Most recent

Tom Skeen

Tom Skeen
Tom Skeen provides guidance on matters relating to IT/Risk/Security challenges to the Safe-T Data leadership team and customers.

Recent Posts

NotPetya Caused Maersk to Lose Hundreds of Millions in US Dollars

By Tom Skeen September 1, 2017 cyberattack, Ransomware
The world’s largest container ship and supply vessel operator, Maersk, announced last week that it has suffered hundreds of millions in U.S. dollar losses from the ransomware attack, “ NotPetya ”. 

Everything You Need to Know About the Swedish Data Leak

By Tom Skeen August 8, 2017 Data Breach

Nothing is more scarring than the possibility of having your personal data fall into the wrong hands. The impact seems even more callous when the cause behind the breach is not a malicious virus, or a mystery hacker from a far away land, but rather from an oversight by an institution that you’d think would be good at following its own laws- The Government.

Do We Have to Hire a Data Protection Officer? Understanding the Role of the DPO

By Tom Skeen July 12, 2017 data protection, GDPR

The European Union's General Data Protection Regulation (GDPR) is coming up in less than a year, and many of its requirements are not quite clear. A good example of this is the responsibility for companies to hire a Data Protection Officer. This may engender a few questions, such as:

GoldenEye “NotPetya” Ransomware Is Disrupting The Globe With Irreversible Damage

It’s not just the physical world that’s volatile; the cyber world isn’t safe either. Just barely a month after Wannacry ransomware shook up the cyber ecosystem, there was another cybersecurity epidemic that wreaked global havoc on June 27th.

This time it’s Petya, or is it NotPetya... or maybe GoldenEye...

How Have Technology Security Budgets Changed?

The days of no funding or insufficient funding being allocated to technology security budgets, to prevent cyber attacks, information compromise and ransom, are long gone. 

How to Secure Legal Records from Cyber Hackers

It’s no mystery that companies and individuals are hacked every day and information is compromised. Criminals use this information in many ways and one of them is to profit from it in the global markets violating insider trading laws.

Filling the Gap In Law Firm Security

It’s no secret that law firms hold a massive amount of confidential client data. And with the dramatic growth and usage of cloud computing, the need to secure the transmission and sharing of this data is becoming more important than ever.

10 Ways To Secure Legal Documents

All companies have a responsibility to secure client documents, but the legal professional has an extended ethical obligation. Your legal professional has some of your most personal and business information and they must be diligent with security and securing legal documents.  

10 Ways Your Jewish Federation Can Start Adopting Cyber Security Too

The Jewish Federation of Greater Vancouver is taking information protection seriously by adopting cyber security measures. The federation recently took action to shore up its data protection strategy due to recent rises in extremism in Canada and the United States and the widespread threats to the Jewish community becoming more widespread.

6 Predictions for Cyberattacks and Threats in 2017

By Tom Skeen February 2, 2017 Cyber Security, cyberattack

As new hacking methods and tools target an increasing amount of vulnerable attack surfaces, industrial and government sectors, once thought safe, are now prime hacking targets.

Get Email Updates

Sign up for our monthly newsletter and latest blog posts....keep up to date on the latest security data news!

Contact Us: